/
International Journal of Emerging Trends  Technology in Computer Science IJETTCS Web Site International Journal of Emerging Trends  Technology in Computer Science IJETTCS Web Site

International Journal of Emerging Trends Technology in Computer Science IJETTCS Web Site - PDF document

lindy-dunigan
lindy-dunigan . @lindy-dunigan
Follow
487 views
Uploaded On 2015-03-09

International Journal of Emerging Trends Technology in Computer Science IJETTCS Web Site - PPT Presentation

ijettcsorg Email editorijettcsorg editorijettcsgmailcom Vol ume 2 Issue 2 March April 2013 ISSN 2278 6856 Volume 2 Issue 2 March April 2013 Page 259 Abstract Trust Based service is the abstract form of the symbolic represe tation of social trust Thi ID: 43128

ijettcsorg Email editorijettcsorg editorijettcsgmailcom Vol

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "International Journal of Emerging Trends..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 2 , March – April 2013 ISSN 2278 - 6856 Volume 2, Issue 2 March – April 2013 Page 259 Abstract: Trust Based service is the abstract form of the symbolic represe n tation of social trust. This trust system is used to develop the confidence between the groups of people on timely event also. So if any point of view a pe r son ne eds a service which is to be represented on the time, then the perfectness on whom to trust and up to what extent one should be effectively partic i pating can be calculated from so called analysis. Here the times based confide system is based on the equilat erals on the following concepts as (1) Timely Events and (2) Near Events and (3) Events that “touch” In Timely based Events, nearly everybody is desirous to know about what is happening around them. They pursue the internet, read the newspapers, and watch TV and text message their friends to stay alert on daily events happening around them. In that respect everyone is interested in knowing about what is happening now, or this morning, or before they go to bed. In Near Events the average reader is more inter ested in the events that take place near him than those at a distance. In that concept, more distant the event, the less interesting it is. As you see, distance plays an important factor affecting in one’s interest. The last but not the least is Events tha t “touch”. In this aspect the event that is happing near him largely because they touch his life somehow, in some way. The information that is gathered is interesting due to some respect because it is affected to the nearby users. Keywords: Trust based, So cial Networking, Confide Based System, Timely Events Trust based service system, Service System. 1. I NTRODUCTION As explained Trust based system can be seen as symbol - based automation of social decisions related to trust, where social agents instruct their t echnical represent a tions on how to act while meeting technical representation of other agents. In that respect the trust system is used to set the rules defined by social agents that they re p resent. [1] Trust management can be best illustrated through the everyday experience of tickets. One can buy a ticket that entitles him e.g. to enter the stadium. The ticket acts as a symbol of trust, stating that the bearer of the ticket has paid for his seat and is entitled to enter. However, once bought, the ticket can be transferred to someone else, thus transferring such trust in a symbolic way. At the gate, only the ticket will be checked, not the identity of a bearer. [2] Here the Timely based Trust System is di s tributed in mainly three events namely, Timely Even ts, Near Events and events that “Touch”. Timely Events are for nearly every person who wants to feed the desire to know that is going on around them. So they extract information from the Internet, read the newspaper, watch T.V., and text message their fri ends to stay alert on current trends, events and news. They are interested in things that are happing now, or this morning, or before they go to sleep. The fact that the event “Just happened” is suff i cient to interest most persons. We live in the present. The events of today, or even this hour is more important, while yesterday’s news continually crowd out from our minds. One of the first elements of interest therefore is timeliness. Now the second stepping stone is Nearly Events. In this event the average reader is more interested in events that take place near him than those at distance. The fact that a burglar entered a house on reader’s street and stole jewelry is more interes t ing than reading about crazy person robbing banks in another city. The wreck of neighbor’s Rolls Royce keeps us talking much longer than a massive train wreck in any other country. The average person is more interested in things going on around him – things happening to persons he knows or near places he knows. He has little inte rest left for events occurring at a distance or elsewhere. The more distant the event, the less interesting it is. So distance is an important factor affecting one’s inte r est. The third stepping stone is Events that “Touch”. In this event the average read er is more interested in events that take place near him largely because they touch his life somehow and in some way. In similar situation, any event, nearby or far away, that affects his life will interest him immediately. An oil spill in Iraq may interes t us reader mildly, but if it raises local gas prices, then we begin to talk about it at once. The event – the rice of gas prices – is not only nearer, but it affects us personally. Timely Event - based Confide System using Social Networking Niraj Bhagchandani 1 , Nilesh Padhariya 2 and Pinaki A. Ghosh 3 1 Gujarat Technological University, Atmiya Institute of Techno logy and Science , Kalawad Road , Rajkot, Gujarat, INDIA 2,3 Associate Professor, Department of Computer Engineering, Atmiya Institute of Technology & Science, Kalawad Road, Gujarat, INDIA International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 2 , March – April 2013 ISSN 2278 - 6856 Volume 2, Issue 2 March – April 2013 Page 260 So overall to judge the real value or interest in any event, one need to know thoroughly study the profession. For example, if reader is of business profession, then system should work on the basis business only as he may not be interested in cricket news; and also young lawyers are not interested in the same things as car mech anics. 2. O RGANIZATION OF P APER This paper represents the thesis proposal of partial fulfillment of Master of Engineering in Computer Engineering. Inside it, various sections explain the definition starts from section 3 which indicates the previous work done by various researchers taken as base. Section 4 includes definition of research. Next section gives idea about architecture of system. Section 6 describes step by step representation with equation used for implementation. Next sections describe an example of this work and conclusion respectively. Citations of referred papers are shown in reference section. Section Author includes introduction to Authors. 3. R ELATED WORK Timely Event based trust system is a uniquely designed to know the interest of people in which they are categorized to work. So here in this section trusted system can be defined truly on the basis of classifications of various norms. Perhaps during earlier times the email systems were used to share the info r mation between the two people wit hout interference of the rest of the clouded people but in today’s world information sharing is gone global [3] and so are the security problems. In that respect the lot of field such as E - commerce on internet zone cannot be easily trusted [4] . Due to thi s reason various other steps are taken for accumulating the responses and results. Here approaches made by describing various E - marketing models using Social Networking on which the trust can be more clarified. [5] One of them also proposed a new idea of g etting a group based service on E - commerce bu y ing using Social Networking. [6] On the other hand of timely event, the resources can be gathered from the a p proaches taken for obtaining the identity and privacy to ensure the user workability and safety. [7] This system is needed when the user is required to produce some art i facts on timely based events such as ticket checking and much more. In context to privacy there is one more option to opt according to the profe s sion and user centric view and details, [8 ] the information could be delivered on the basis of the selection of the user’s reviews and likes on Social Networking. So with respect to the user likings the professional businessman would be subscribed for bus i ness news rather than getting sports news or any other irrelevant news to business person. This news also gets changed on time to time basis. This could be also extended on the nearly events such as Movies reviews based on Semantic Web - based social networks, to generate the movie recommendation. [ 9] In this respect the extensions could be done more on the location basis and various a t tributes can be also added to work on the reviews to be generated. The social networking concepts can also be made more attractive by timely based E - learning concept w hich treats all the persons gaining access to it, can educate them by “Each one Teach one” concept. [10] Also the same concept can help indeed to work or attract people on timely basis to government sectors in G2B i.e. Government to Business sectors. The s ame concept can be used to define the productivity and pe r formance up gradation of the services and products. [11] Also on the location and service based on time, one can approach the business trust system based on behavior of the system. This would give t he new horizon t o wards the structured way of getting the awareness of behavior of the organization or firm or individual. [12] 4. P ROBLEM CONTEXT The work is mainly focused on the effective collection of data and generating var i ous analyses on the basis of t echniques and policies with platform of Social Networ k ing websites. Here, the main goal is to generate various trust based timely events which can be collected from various user resources and give particular attentions on the social networking system. Furt hermore we can consider the various challenges on overcoming new coming events and timely generated responses. The main contributions of work shall be in following - folds as mentioned below: 1) The system is working purely on basis of user opinions and review s on social networking websites, which would generate the analysis on various aspects. 2) All the three timely events mentioned in abstracts can be easily covered in broader sense. 3) Designing an algorithm which suits the following style and testing on Social N etworking websites by developing apps accordingly. 4) The analysis portion would conclude various analyses which could be then tested by our trust based system and check its reliability and other info r mation. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 2 , March – April 2013 ISSN 2278 - 6856 Volume 2, Issue 2 March – April 2013 Page 261 5. A RCHITECTURE OF S ERVICE S YSTEM Here, the archite ctural design is having the base of a user who wants to gain some analytical knowledge about the timely based system. This system can be helpful to a lot of user to keep in state of mind that how probability could help them discover the new ways to solve t he problems of daily world by gaining the views and trusts of different people in our circle. Also, here in this system the User is will generate an event from the application developed in support of a social networking website. This would deal with a lot of options to serve and fit the best for the user to please their friends and colleagues. Thus our system is basically been divided into three most prestigious stage which is described in the later stage, i.e. Timely Events, Nearby Events, Events that “tou ch” Figure 1 : Timely Based Event System Architecture This in respect would give more options in depth like, time, services, relations, places, influence, environment, trust, direct or indirect. The User will generate the events as per its need and requirement and along with that he will generate the que s tionnaires for his friends and its group circle to look forward. Then comes the analysis phase in which ratings, scaling, ranking of particular events are been discovered and stru ctured to give proper working of the system. 6. S YSTEM A LGORITHM Algorithm has been decided by testing a lot of criteria and finally d e signed following steps which are going to be implemented.ps to follow. System is basically depends on trust as well as ev ents those are to be generated. So, time is measure concern for current research. Step 1 : Generate number of events from this application. Step 2: Get user’s opinion or rating for any events which are going to be generated. Generate a matrix of user ratin g for any event. Following matrix defines in the form of ‘Event x User’. R mxn =                        mn m m n n r r r r r r r r r 2 1 2 22 21 1 12 11 : . : : Where 0  r ij  1 Step 3: Find Correlation matrix by using following formula: D mxm =                        mm m m m m d d d d d d d d d 2 1 2 22 21 1 12 11 : . : : Wh ere, d uxv = 2 1 ) (  =  n i iv iu r r N ij,k = 2 * D mxm Step 4: Find trust value between two nodes i and j for any time k. Time by time trust value may be changed as per user’s rating and communication. [8] T ij, k = [log 2 (N ij, k +2)] ψij, k Where , ψ ij, k =        2 2 2 ji ij ji ij d d d d        ji ij ij d d d β Where ψij , k =Trust Factor r ij = rating given by any user j to event i. r ji = rating given by any user i to event j. β= Scale Factor= 1.808318 Step 5: Genera te trust matrix by using above T ij =  = n k k ij k T 1 , n 1 T ij is the overall trust rank of i to j for n time intervals. For a sequence of time intervals k=1... n , we represent t 1 as the current time interval and t n as the farthest time interval from cu r r ent time. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 2 , March – April 2013 ISSN 2278 - 6856 Volume 2, Issue 2 March – April 2013 Page 262 T ij =                        mn m m n n t t t t t t t t t 2 1 2 22 21 1 12 11 : . : : Step 6: Find performances from the various criteria. For that purpose cr e ates a table which is shown below: Priority will be given by a u s er who generates an event. Table 1 : Trust Ta ble Event User IT 1 FT 2 Performanc e Performance =        1 st InitialTru FinalTrust X 100 % Step 7 : To find the overall performance, e Performanc = i n i e Performanc n  = 1 1 7. I LLUSTRATIVE EXAMPLE The System consists of mainly three core parts as mentioned in the Architect ural Design. The time based event system is a good to be understood in regular life. The example we can set here can be given as: Suppose a company person wants to keep track of his products in different ways, i.e. Which product sale the most in the locati on, what is the price affecting them, what are the artifacts that one needs to study to boom their product. Also, the occasion in which the person can spend more onto which product to give better sale and its boo m ing profits. So, this would give a new look towards the system readiness and its effe c tive style of business. Another example we could study of is the weather in which a traveler can travel to particular country or city. Here traveler can generate a time based event system about the weather in whi ch he feeds all those information which can be understood by his friends. His friends who have the knowledge would vote for it accordingly. This vote would also depend on the previously owned trust by him. So the result would become more and more accurate accordingly. 8. C ONCLUSION While everybody thinking on the internet in today's life the social networking comes the fore front to gain the 1 IT = Initial Trust 2 FT = Final Trust knowledge about timely based event system, working on today's life. Here all the aspects and chapters of daily life can not be covered but can study a small but an important topic can be thoroughly studied. Imaging about the future extension, we can go beyond still equate more in unions, and subsets forms, giving more detailed knowledge of connected people mathemat i cally, this equates to more precise and improvised form of generated results. Here, instead of getting at particular basket of bowl - if any implementation can be done in which the entire gulp can be grabbed then the algorithm would even get more of the perspecti ve. References [1] Nixon, P., S. Terzis, et al. (2003). “Experience with the KeyNote Trust Management Sy s tem,” Applications and Future Directions. Trust Management , Springer Berlin Heidelberg. 2692: 284 - 300. [2] Cofta, P. (September 2007). “Trust, Complexity and Control” Confidence in a Convergent World, Wiley. [3] Marshall D. Abrams, P. D. and M. V. Joyce (1995). "Trusted System Concepts." Elsevier Advanced Technology, Oxford,UK 14 No.1 : 45 - 56. [4] Tzu - Yu, C. “ Trust with Social Network Learning in E - Commerce .” Communications Wor k shops (ICC), 2010 IEEE International Conference on. [5] Kabbany, N., M. Shen Si, et al. “ Developing E - market model using social networks .” Indu s trial Electronics and Applications (ISIEA), 2011 IEEE Symposium on. [6] Xiaona, L., T. Y e, et al. “ A social network - based trust model for group - buying .” Broadband Network and Multimedia Technology (IC - BNMT), 2011 4th IEEE International Confe r ence on. [7] Galpin, R. and S. V. Flowerday “ Online social networks: Enhancing user trust through e f fectiv e controls and identity management .” Information Security South Africa (ISSA), 2011. [8] Dijiang, H. and V. Arasan Email - based Social Network Trust. Social Computing (SocialCom), 2010 IEEE Second International Conference on. [9] Golbeck, J. and J. Hendler (2006). “ FilmTrust: movie recommendations using trust in web - based social networks ,” Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE. [10] Yingchun, L. and W. Youli “ A Survey on Trust and Trustworthy E - learning System ,” Web Information Syst ems and Mining (WISM), 2010 International Conference on. [11] Shambour, Q. and L. Jie “ A Framework of Hybrid Recommendation System for Gover n ment - to - Business Personalized E - Services ,” Information International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Vol ume 2, Issue 2 , March – April 2013 ISSN 2278 - 6856 Volume 2, Issue 2 March – April 2013 Page 263 Technology: New Generations (ITNG), 2010 Seventh International Co nference on. [12] Ming, H., H. Aiqun, et al. (2009). “ Research on Behavior Trust Based on Trustworthy Di s tributed System ,” Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on. AUTHOR Niraj Bhagchand ani received B.E. degree in Computer Engineering from Atmiya Institute of Technology and Science, Rajkot under Saurashtra University in 2010. Presently in 2013, he is pursing Master of Engineering (M.E.) degree in Computer Engineering from Atmiya Institute of Technology and Science, Rajkot under Gujarat Technological University. Nilesh Padhariya is an assistant professor of computer engineering at Atmiya Institute of Technology and Science, Gujarat, INDIA. He is perusing his Ph. D. degree in Computer Scie nce at Indraprstha Institute of Information Technology, Delhi (IIIT - D), INDIA, where he works on mobile data management and economy - based incentive schemes for peer participation in mobile environment. He earned his M.Tech. degree in Computer Applications in 2006 from Indian Institute of Technology, Delhi (IITD), one of the prestigious institutions of INDIA. His work addresses the efficient data management using effective economic incentive - based schemes in mobile ad hoc peer to peer (M - P2P) networks. It in cludes the dynamic query processing and the data replication in M - P2P networks using economic schemes. His work has been published at prestigious conferences and peer - reviewed journals. He has also received several grants for research and publications. Pinaki Ghosh is an Associate Professor in Computer Engineering and Information Technology Department at Atmiya Institute of Technology and Science, Rajkot. He has received B.E degree in Computer Science from Barkatullah University, Bhopal and M.Tech in Com puter Science and Engineering from Rajiv Gandhi Technological University, Bhopal. Currently he is doing his Ph.D in Computer Engineering from School of Technology, R K University, Rajkot. He has 12 years of teaching various subjects like Artificial Intelli gence, Computer Graphics, Parallel Processing and Computing, Data Structures and Algorithm etc.